1 / 22

Hardware Security Training By TONEX

The hardware security instructional class acquaints you with an assortment of cryptographic processor and preparing overhead, side-channel assaults, physically unclonable capacities, hardware-based genuine random number generator, watermaking of IPS, FPGA security, uninvolved and dynamic metering and hardware based secure program execution. <br><br>Trainees Also Will Learn about: <br>Counterfeit detection, criminal activities, detection standards and physical analysis in hardware security. This course gives you the sufficient knowledge to identify the hardware threats, methods of hardware metering, unclonable identifiers and ending piracy of integrated circuits (ICs). <br>The fault injection attacks in hardware security, classification of attacks, invasive attacks, countermeasures, exploits, and data remanence. <br>How a physical hardware attacks harm the hardware security by learning tamper resistance, classification of physical attacks, automated decapsulation, deprocessing methods, side channel attacks, or microprobing. <br><br>Who Would Benefit From This Training? <br><br>If you are an IT professional who specialize in system, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of hardware security training and will prepare yourself for your career. Finally, the hardware security training will introduce the hardware Trojans which decrease the hardware system reliability and leads you to the basics of crypto processor design techniques. <br><br>Training Objectives: <br><br>Learn the state of the art security methods and devices <br>Integrate the security as a design metric <br>Explain the common hardware trojans <br>Design secured hardware FPGA <br>Understand the attacks in embedded system <br>Explain the design procedures of crypto processor <br>Protect the design intellectual property against privacy <br>Understand the physical attacks in hardware security <br>Understand hardware attacks and providing countermeasures <br><br>Training outline: <br><br>Introduction to Hardware Security <br>Hardware Cryptography <br>Basics of VLSI <br>Counterfeit Detection <br>Hardware Metering <br>Fault Injection Attacks in Hardware <br>Physical Hardware Attacks <br>Side Channel Attacks <br>Secure Hardware Design for FPGAs <br>Embedded System Security <br>Security of Radio Frequency Identification (RFID) <br>Hardware Trojans <br>Crypto Processor Design <br>Hands-on and In-Class Activities <br>Sample Workshops Labs for Hardware Security Training <br><br><br>Visit Tonex website for more information. <br><br>Hardware Security Training By #TONEX <br>https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

bryanlen
Download Presentation

Hardware Security Training By TONEX

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HARDWARE SECURITY TRAINING Cyber security Training Seminars – Total 44 courses https://www.tonex.com/cybersecurity-training-seminars/ https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  2. Hardware Security Training Price: $1,699.00 Length: 2 Days The hardware security instructional class acquaints you with an assortment of cryptographic processor and preparing overhead, side-channel assaults, physically unclonable capacities, hardware-based genuine random number generator, watermaking of IPS, FPGA security, uninvolved and dynamic metering and hardware based secure program execution. Have you at any point experienced removing your secret keys from embedded systems? It is safe to say that you are having an item powerless against hardware assaults? Have you even needed to ponder and secure you framework against these sorts of undesirable assaults? On the off chance that your response to any of these inquiries is truly, this course is for you. By taking the hardware security preparing, you will take in the nuts and bolts of hardware security, and hardware cryptography. Essential themes, for example, crypto framework, cryptanalysis, figures, and information encryption standards (DES) are secured. Besides, you will be acquainted with the nuts and bolts of VLSI and hardware gadgets vital in PC security, for example, CMOS, PMOS and VLSI design cycles. https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  3. Hardware Security Training • Trainees Also Will Learn about: • Counterfeit detection, criminal activities, detection standards and physical analysis in hardware security. This course gives you the sufficient knowledge to identify the hardware threats, methods of hardware metering, unclonable identifiers and ending piracy of integrated circuits (ICs). • The fault injection attacks in hardware security, classification of attacks, invasive attacks, countermeasures, exploits, and data remanence. • How a physical hardware attacks harm the hardware security by learning tamper resistance, classification of physical attacks, automated decapsulation, deprocessing methods, side channel attacks, or microprobing. • Who Would Benefit From This Training? • If you are an IT professional who specialize in system, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of hardware security training and will prepare yourself for your career. Finally, the hardware security training will introduce the hardware Trojans which decrease the hardware system reliability and leads you to the basics of crypto processor design techniques. https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  4. Hardware Security Training • Audience: • The hardware security training is a 2-day course designed for: • All individuals who need to understand the concept of hardware security. • IT professionals in the areas of hardware security, embedded system security and secure hardware design • Cyber security professionals, network engineers, security analysts, policy analysts • Security operation personnel, network administrators, system integrators and security consultants • IT professionals interested in the field of hardware security • Security traders to understand the hardware security of embedded systems. • Investors and contractors who plan to make investments in security system industry. • Technicians, operators, and maintenance personnel who are or will be working on cyber security projects • Managers, accountants, and executives of cyber security industry. https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  5. Hardware Security Training • Training Objectives: • Upon completion of the hardware security training course, the attendees are able to: • Learn the state of the art security methods and devices • Integrate the security as a design metric • Explain the common hardware trojans • Design secured hardware FPGA • Understand the attacks in embedded system • Explain the design procedures of crypto processor • Protect the design intellectual property against privacy • Understand the physical attacks in hardware security • Understand hardware attacks and providing countermeasures https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  6. Hardware Security Training • Training Outline: • The hardware security training course consists of the following lessons, which can be revised and tailored to the client’s need: • Introduction to Hardware Security • Hardware Cryptography • Basics of VLSI • Counterfeit Detection • Hardware Metering • Fault Injection Attacks in Hardware • Physical Hardware Attacks • Side Channel Attacks • Secure Hardware Design for FPGAs • Embedded System Security • Security of Radio Frequency Identification (RFID) • Hardware Trojans • Crypto Processor Design • Hands-on and In-Class Activities • Sample Workshops Labs for Hardware Security Training https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  7. Hardware Security Training • Introduction to Hardware Security: • History of hardware security • Smart cards prone to attacks • Radio Frequency Identification (RFID) • Microelectronic industry business model • Hardware threats • IP vendor • System integrator • Manufacture • Third IP design issue • Design process-new approach • Untrusted system integrator • Counterfeiting • Supply chain vulnerabilities • Basic definitions in Hardware security • Security and protection objectives • Hardware vulnerabilities • Adversaries • Hardware control • Embedded system security https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  8. Hardware Security Training • Hardware Cryptography: • Basic terminology of Cryptography • Advantages of Cryptography • Crypto system with keys • Classification of Cryptosystem keys • Cryptanalysis • Breakable encryption • Ciphers • Caeser Cipher • Statistical analysis • Polyalphabetic Substitution • Transposition Ciphers • Product Ciphers • Stream and block ciphers • Data Encryption Standard (DES) • Generation of round keys • Security of DES • Concept of AES • Motivation for Public Key Encryption (PKE) • RSA encryption https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  9. Hardware Security Training • Basics of VLSI: • nMOS transistor • PMOS transistor • CMOS • Performance comparison • Boolean algebra • CMOS logic implementation • Definition of integrated circuit • Introduction to VLSI • VLSI design cycle • VLSI design constraints • VLSI logic design • VLSI defects https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  10. Hardware Security Training • Counterfeit Detection: • Lucrative business • Criminal activity • Counterfeit electronic • Detection standards • Laboratory standard • Aerospace standard • Risk classifications during test levels • Detection flow and methodology • Counterfeit types • Recycled parts • Overproduction • Supply chain vulnerability • External Visual Inspection (EVI) • Physical analysis • Acoustic Microscopy scanning • X-Ray inspection • Electrical test • Temperature cycling • IC enabling by active metering • Physical Unclonable Functions (PUFs) https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  11. Hardware Security Training • Hardware Metering: • Hardware threats • Why Hardware Metering? • Passive Hardware Metering • Active Hardware Metering • No-nfuctional identification • Unclonable identifiers • Functional metering • Internal active metering • External active metering • Ending Piracy of Integrated Circuits (EPIC) • Logic Barriers • Secure Split Test (SST) • Finite State Machine (FEM) • Remote Activation of ICs https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  12. Hardware Security Training • Fault Injection Attacks in Hardware: • Classification of Attacks • Threats • Security of Hardware • Non-Invasive attacks • Semi-invasive attacks • Invasive attacks • Countermeasures • Exploits • Data Remanence • Timing attacks • Power Analysis attacks • Practical Fault injection attacks https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  13. Hardware Security Training • Physical Hardware Attacks: • Definition of Tamper Resistance • Categories of attackers • Protection levels • Classification of physical attacks • Automated Decapsulation • Deprocessing • Reverse engineering • Microprobing • Bus Encryption • Bus Scrambling • Sensors • UV attacks https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  14. Hardware Security Training • Side Channel Attacks: • Introduction to side-channel emissions • Exploited side channel emissions • Hardware targets • Attack classifications • Smart Cards • FPGAs • Power Attacks • Timing Attacks • EMA attacks • Simple Power Analysis (SPA) • Differential Power Analysis (DPA) • Kocher’s attack • Spatial Positioning https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  15. Hardware Security Training • Secure Hardware Design for FPGAs: • Introduction to FPGA Architechture • Overview of FPGA • Manufacturing Flow • FPGA security design • FPGA attacks • FPGA defense technology • Current advancement toward FPGA design https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  16. Hardware Security Training • Embedded System Security: • Embedded system definition • Examples of embedded systems • Characteristics of embedded system • Embedded system attacks • Physical attacks • Fault induction • Electromagnetic Analysis • Design challenges in embedded system security • Countermeasures of embedded system security https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  17. Hardware Security Training • Security of Radio Frequency Identification (RFID): • Introduction to RFID • Application of RFID • Security attacks to passive RFID • Impersonation • Information leakage • Physical manipulation • Protection methods of RFID • PUF and Unclonable RFID tags • Security measures • Fingerprinting RFID Tags https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  18. Hardware Security Training • Hardware Trojans: • Definition of Hardware Trojan • IC/IP trust problem • Malicious addition • Changing the functionality of hardware • Reducing the hardware reliability • Leaking hardware information • Application and targeted attacks with Hardware Trojans • Examples of Hardware Trojans • Defense techniques • Crypto Processor Design: • Definition of Crypto processor • Design of Crypto processor • Performance of Cryptographic Hardware • Trusted Platform Module • Crypto processor attack • Crypto processor defense techniques • Documented Crypto processor attacks Hardware Trojans https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  19. Hardware Security Training • Hands-on and In-Class Activities: • Labs • Workshops • Group Activities • Sample Workshops Labs for Hardware Security Training: • specifying the security objective of an already designed device • Security assessment of integrated circuits • Simulating and Testing the hardware before synthesis • Synthesizing a new design on an FPGA • validating the hardware against directed tests • fixing every one of the security vulnerabilities you uncover, every step of the way • Security tests of multimedia hardware • Security examination of embedded systems • Hardware Trojan Design in Crypto-System • Hardware Security Primitive – PUF Designs • Hardware Trojan Detection in FPGA Bit Files https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  20. Why Tonex? ( From Tonex.com ) • Tonex has been documenting the cybercrime evolution for 25 years when it first began training organizations on how to better deflect contemporary cyberattack. • Our Cybersecurity training courses and seminars are continuously updated so that they reflect the latest industry trends, and they are also created by specialists in the industry who are familiar with the market climate. • So far we have helped over 20,000 developers in over 50 countries stay up to date with cutting edge information from our training categories. • We’re Different because we take into account your workforce’s special learning requirements. In other words, we personalize our training – Tonex has never been and will never be a “one size fits all” learning program. • Ratings tabulated from student feedback post-course evaluations show an amazing 98 percent satisfaction score. • Contact Tonex for more information, questions, comments.

  21. Cyber security Training Seminars – Total 44 courses https://www.tonex.com/cybersecurity-training-seminars/ HARDWARE SECURITY TRAINING VISIT TONEX.COM https://www.tonex.com/training-courses/hardware-security-training-by-tonex/

  22. https://www.tonex.com/

More Related